The marathon of conferences in Indonesia continues - on February 23 an event will take place in Marabahan at 14:30 - 17:30 UTC + 08 at the Prima Hotel Batola (jl.Basuki Rahmad, Marabahan, Kalimantan Tengah, Indonesia).

Dear users and participants of the project Octoin,
The planned fork happened. The transition to the version 1.3.1.0 of the wallet was made. Bugs were fixed, functioning was improved, network stability and synchronization speed in the data were increased, there were also minor adjustments in the design of desktop user wallets.

We are pleased to announce a major conference in Indonesia. It will be held on February 19 at 13:30 - 16:00 UTC +07 at the Sala View Hotel (Jalan Brigjend Slamet Riyadi No.450, Purwosari, Laweyan, Kota Surakarta, Jawa Tengah 57142). Speaker: Mr. Asmart (081328392007).

Our representatives from Indonesia continue to share their successes! Not so long ago (3rd February) a conference was held in the city of Kediri.
At the conference, led by the leader Mr. Yayang Agung Sundawa visitors could learn about the basics of blockchain, about cryptocurrencies and about our resource Octoin. All interested persons received a lot of new information about the sphere of cryptobusiness.

The marathon of conferences in Indonesia continues - on February 18 there will be an event in the city of Jogia at 13:30 - 16:00 UTC +07 at the Hotel Neo Malioboro (Jalan Pasar Kembang No. 21, Malioboro, Yogyakarta City, Special Region of Yogyakarta 55271).

We have completed the upgrade of our P2P-exchange on the site Octoin.com, and restored access to it for all members of the community.
To make it easy for our users to continue working on the P2P-exchange, the Octoin team prepared a step-by-step instruction on creating purchase or sale orders:

We are announcing 2 meetings in Indonesia, which will be held on February 18 in the cities of Depok and Kapuas
In Depok, the event will be at 13:00 - 17:00 UTC + 07 at The Margo Hotel (Jalan Margonda Raya 358, Depok, Indonesia 16423). Speaker: Imran & Depok Team (082199809998).

ATTENTION! On the P2P exchange, we noticed the actions of users offering transactions outside our platform. As a rule, such proposals lead to an unregulated exchange without the deposit of funds of users participating in the exchange. It is not advisable to follow the invitations of such persons and enter into correspondence with them through their WhatsUp, Viber, Telegram.

Assembled by someone's own hands mining farms for a long time were the mainstream of the mining industry. Who has not seen a photo with a variety of "batteries" of video cards of the most bizarre kind?

The team from Indonesia continues to amaze: in recent months, many webinars and conferences have been held. A lot of people joined our community during this time. Leaders from other countries can safely take an example from them!

The main technological feature is the use of the scrypt function as a hashing algorithm and a POS generation system.
Proof-of-stake (PoS) - a method of protection in crypto currencies, based on the need to prove the storage of a certain amount of funds on the account. When using this method, the algorithm of crypto currency is more likely to choose an account with a large amount of funds in the account to confirm the next block in the chain.
In other words, the blocks are signed by the nodes of the stakes (the owners of the shares). The probability of signing the block increases depending on the size of the stake. Therefore, the crypto currency is resistant to most attacks to which POW systems are vulnerable. In addition, coin self-organization will be carried out through mining, where a direct stimulus to the support of the network will be the issue of new coins.
Another not unimportant advantage is that the OCC mining technology does not require the cost of power supply for storage and processing of colossal databases serviced by huge mining farms.
OCC Mining is more energy efficient!

Security

OCC uses several cryptographic algorithms to ensure the security of its users:
The first of these is ECDSA, a public key encryption algorithm that is associated with every coin in a system using a public key, private key and signature, so that each node of the network host can verify the coin's identity.
The second is the already known encryption algorithm SHA-256 and is considered the gold standard in most crypto currency in the world.

SegWit

Thanks to the use of SegWit, which implements approximately fourfold increase in the block size. Each block in the OCC will be generated in 2.5 minutes versus 10 minutes in cryptothermics based on POW.Capacity without the use of Lightning Network 7 - 10 transactions per second.Capacity with the use of Lightning Network technology is more than 100 transactions per second.

Lightning Network

LN technology gives OCC a number of excellent features, one of them is an unlimited number of transactions processed almost free of charge in the so-called payment channel. The Lightning Network protocol also allows you to calculate the network commission only when the channel is closed (for example, at the end of the day or month). This fundamental feature is difficult to overestimate, as it will several times increase the efficiency of using the capacity of the blockchain network.The implementation of Lightning Network is a priority task, which will go into development immediately after the launch of the blocking system and the release of all major purses.

Development of the SDK and API

We understand that no online business can exist today without a clear and stable use case. We will prepare and provide a complete package of integration solutions designed for the most popular online systems that exist today, as well as provide you with clear and simple documentation.

OCCode

This is the possibility of cold storage and transfer of coins through code. This is a convenient and safe method of transferring coins to a user who may not even have a purse at the time of receiving coins. After receiving and activating the code, the user replenishes his balance for the amount of OCC mortgaged during the creation of OCCode.

Anonymity

Each user is allowed to create an unlimited number of addresses. The lack of administrative management and peer-to-peer status makes private or government regulation of the system impossible.